Cryptocurrency-Mining Malware Targeting IoT, Being Offered in the Underground

Cryptocurrencies have been generating much buzz of late. While somegovernments are at work to regulate transactions involving them, there are others that want to stop mining activities related to them altogether. We have noted that cybercriminals have been actively engaged in cryptocurrency-mining malware activities, ranging from those that exploit consumer hardware graphics processing units (GPUs) to those that take advantage of users’ mobile devices.

Crime follows the money, as the saying goes, and once again, cybercriminals have acted accordingly. The underground is flooded with so many offerings of cryptocurrency malware that it must be hard for the criminals themselves to determine which is best. This kind of malware, also known as cryptomalware, has a clear goal, which is to make money out of cryptocurrency transactions. This can be achieved through two different methods: stealing cryptocurrency and mining cryptocurrency on victims’ devices surreptitiously (without the victims noticing), a process also known as cryptojacking. In this post, we discuss how these two methods work, and see whether devices connected to the internet of things (IoT), which are relatively underpowered, are being targeted.

How cryptocurrency-mining and cryptocurrency-stealing malware work

Just like ordinary malware, cryptomalware may assume different forms, ranging from client-side web scripts to mobile applications. With the popularity of online services that make the mining process much easier, it’s worth noting that we have seen an increase in web-based, client-side cryptocurrency-mining malware written in JavaScript.

This threat is not restricted to computers, though. Roughly any internet-connected device may be part of a mining botnet. Criminals just need the code required to make this happen. And they are already developing it, as you’ll soon see here.

Dropper code runs on the victim’s device without the victim’s permission (as with any other malware), either via scripts or via proper executables. To this end, cybercriminals may attack exposed computer infrastructures, launch phishing scams, or maliciously use such tools as browser extensions, mobile apps, and instant messaging.

Miner code runs on the victim’s device and starts using its computing power to calculate hashes. At this point, the victim may notice slower performance on the device or, in the case of a computer, noisier fans as the device tries to cool itself.

The results of the calculations are sent back to the attacker or directly to an online mining pool, either malicious (exclusively set up to support cybercrime) or not. The attacker then converts the results into cryptocurrency.

Cryptocurrency-stealing malware differs from cryptocurrency-mining malware in the following steps:

The malicious code can look for wallets’ addresses on local storage (text documents, configuration files, and so on) and monitor the device memory, including the clipboard. This way, when the victim copies and pastes a wallet address, the malware can replace it with its own address. This behavior reminds us of the Broban malware that used similar techniques to redirect the destination of payment slips in Brazil in 2015.

The malware intercepts cryptocurrency transactions. For each transaction, the amount, whatever the value, is directed into the criminals’ wallets without the user noticing it.

Of course, a wide range of other attacks is possible. We have spotted phishing webpages for cryptocurrency exchangers, mixers, and other services (similar to what happens to online banking websites), but we’ll focus on cryptocurrency malware in this publication.

IoT as target of cryptocurrency-mining malware

The computing power of smartphones and IoT devices is much lower than that of servers or even laptops. However, we definitely see criminals creating cryptocurrency-mining malware to infect these devices. An example of it is DroidMiner, advertised in a forum in 2017:

Figure 1. Posting for silent Monero miner for smartphones

In the same forum, another actor offered a Monero miner for routers, available for different architectures. But he was immediately attacked by another member with higher reputation, saying that it wasn’t worth anything, probably in consideration of the processing power of these devices:

Figure 2. Posting for Monero miner for routers

It does seem that cryptocurrency malware is gaining traction as a topic in forums in the cybercriminal underground, with some dedicated to exploring whether compromising connected devices (however underpowered) for financial gain is a plausible venture. Still, it is not as profitable as other criminals may think — at least not yet.

Details on our cryptocurrency-mining malware findings in the underground, including the most targeted cryptocurrencies and advertised malware features, can be found in this research brief.

Protection against cryptocurrency-mining malware

Mining for cryptocurrency is a computationally intensive task that requires significant resources, not to mention high power consumption. Be that as it may, mining does generate money and we do see related activity on stealing the resources of infected machines, significantly affecting their performance and increasing their wear and tear. In fact, cryptocurrency mining was the most detected home network event by the Trend Micro™ Smart Home Network solution in 2017, while cryptocurrency-mining malware gained momentum toward the end of the year as detected by the Trend Micro™ Smart Protection Network™ infrastructure.

The adverse impact to affected devices makes cryptocurrency-mining malware a credible threat. To mitigate the risks, we recommend these best practices to users:

Regularly update devices with their latest firmware to prevent attackers from taking advantage of vulnerabilities to get into systems.

Security Predictions for 2018

Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.Read our security predictions for 2018.

Business Process Compromise

Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more,
read our Security 101: Business Process Compromise.